First published: Mon Jul 23 2018(Updated: )
In Docker Skeleton Runtime for Apache OpenWhisk, a Docker action inheriting the Docker tag openwhisk/dockerskeleton:1.3.0 (or earlier) may allow an attacker to replace the user function inside the container if the user code is vulnerable to code exploitation.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache OpenWhisk | <=1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.